Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
Preventing loss of
personal data on a
Mobile Network
23.09.2017 / Oleksii Lukin / Head Of
Information Security SubDepartment
Public
• Lukin Oleksii
– Head od Information Security SubDepartment
• Scope
– Presentation focused on technical attacks on a Mobile network and its supporting
infrastructure
– Does not looking specifically are employee internal risks or social engineering attacks both of
which constitute significant risks for any organisation
Introduction
2
1. Definition of personal data in a mobile network
2. Mobile Network attacks & controls
3. BSS & Corporate Network attacks & controls
4. Key Message
Agenda
Definition of personal data in a mobile network
4
Mobile Network & Corporate
systems Generated
Business Process
Generated
Processed and stored on Network & IT Systems
• Customer
• Location data (cell site, country)
• Usage records created for billing
• Call, SMS, MMS details (not
content)
• Data usage
• Corporate
• Email
• Web browsing
• Customer
• Account type (e.g. pre or post-
paid/residential or business)
• Name of customer
• Billing Address
• Payment details
• Employee
• Name
• Contact details
• Salary
Dynamic/Event Static
Mobile Network Attacks - External
5
Mobile Network
GRX
Network
(Used for roaming
data traffic)
Internet
(Used for data
traffic)
SS7/Diameter
(Used for roaming &
interconnect
signalling)
Radio
Access
Network
• All area of a Mobile Network are under
constant academic study for new
vulnerabilities that impact customer
privacy
Mobile Network Attacks - External Signalling
• SS7 (2G-3G)
– Know attacks on SS7 signalling network
– Abuse MAP signalling protocol
– Take advantage of external links to roaming
partners
– Used for location tracking and call/SMS
interception
– DoS on individual customer or network
• Diameter (4G)
– New protocol replacing SS7 in LTE networks
– Attacks similar to SS7
– Difficult to track origination as uses hop-by hop
• GRX traffic
– GTP protocol hacking
– DNS attacks
– Remote Call control
– DoS
• SS7
– Signalling firewall blocking all unauthorised MAP
signalling traffic
– GSMA standardised controls
– Monitoring for abuse (SIEM)
• Diameter
– Signalling firewall
– GSMA standardised controls
– Implementation of Diameter Routing
Agent/Diameter Edge Agent
– IPsec on external connection with IPX provider
– Monitoring for abuse (SIEM)
• GRX (called IPX in 4G)
– GTP protocol aware firewall border firewall
– DNS hardening
– White lists of valid roaming partners
– Uses of GRX/IPX hub provider
– Monitoring for abuse (SIEM)
6
Risks Controls
Mobile Network Attacks – Radio Access Network
• 2G/2.5G
– Risks well know
– Man in the middle (IMSI Catcher) for accurate
location and call/SMS interception
– Weaknesses in GPRS protocol
– Weakness in over the air encryption keys
• 3G
– Limited location attacks
• 4G
– Standard network IP backhaul network open to
eavesdropping of customer traffic
• 2G/2.5G
– Implementation of latest GSMA encryption
algorithms
– Configuration of authentication and over the air
encryption parameters
– Customer applications that can detect MITM
attacks
• 3G
– Standard has improved encryption and network
mutual authentication
– Configuration of authentication and over the air
encryption
• 4G
– Use of IPSec to protect backhaul network
– Standard has improved encryption and over the
air authentication
7
Risks Controls
Mobile Network Attacks – Internet
• Same standardised Internet access for
all radio technologies e.g. 2.5G/3G/4G
• DoS
– Customer
– Network elements
• DNS
– DoS
– Poisoning
• Products & Services (web)
– DoS, hacking & scripting on
– Customer Portal
– Self service
– Products (e.g. Child location tracking)
• Border firewall
• DoS Protection
• NAT’ng
• Hardened DNS
• Web services
– WAF
– Code review & Testing
– Internal vulnerability Scanning
• External vulnerability scanning
• Monitoring for abuse (SIEM)
8
Risks Controls
Mobile Network Attacks – Internal
• Network & Service Delivery Elements
– Unauthorised access to customer information
– Ability to change customer service profile
• Note: Each network element or service
delivery platform has differing risks and
may or may not contain meaningful
customer information
– e.g. GSM uses a temporary identity (T-IMSI) on
some network elements to hide the customer true
IMSI
• Internal firewall between domains
• Strong access control policy
• Security Patch management
• Security testing
• Internal vulnerability scanning
• Monitoring for abuse (SIEM)
9
Risks Controls
Remote
Vendor
Support
• Mobile network generated event data is stored and processed in the BSS
environment
• There is segmentation between corporate users and BSS platforms
Business Support System (BSS) & Corporate
Network
10
BSS &
Corporate
Internet
(email, Corporate
Internet)
Mobile
Network
BSS & Corporate Network Attacks – External
• Corporate Email
– Phishing
– Malware & Virus
– SPAM
– DoS
• Corporate Internet
– DoS
– Malware & Virus
– Hacking
– Fake sites
– Internal DNS
• Unprotected vendor access
– Unauthorised access to Network and IT systems
• Border firewall
– DoS Protection
• Hardened DNS
• External vulnerability scanning
• Anti-virus and Malware protection
• Security Patching
• Data Loss Protection
– Protects against internal fraud/abuse of customer
information
• VPN, VDI, strong authentication for
vendor access
• Monitoring for abuse (SIEM)
11
Risks Controls
BSS & Corporate Network Attacks - Internal
• Billing & Charging Platforms
– Loss or corruption of charging event data
– Unauthorised access to customer information
• Customer Care
– Unauthorised access to customer information
– Unauthorised changes (fraud)
• Data Warehouse & Reporting Systems
– Unauthorised access to customer information
• HR Systems
– Access to personal employee information
• Network Support Systems
– Ability to monitor customer activity
– Unauthorised changes to customer’s service
• Border firewall
– DoS Protection
• Hardened DNS
• External vulnerability scanning
• Anti-virus and Malware protection
• Security Patching
• Data Loss Protection
– Protects against internal fraud/abuse of customer
& corporate information
• Strong access control policy
• VPN, VDI & strong authentication for
vendor access
• Monitoring for abuse (SIEM)
12
Risks Controls
• Personal data is created and stored both in the Mobile , BSS and
Corporate networks
• Some areas of risk are harder to manage as they are reliant on
– Technology standardisation
– People
• Security should always be applied in layers with good basic principles
• Initial security assessment with continual testing and review
• 24x7 monitoring using a SOC (SIEM)
• Effective incident response process
Key Message
13
Managing the risks to personal data is a continuous process as
technology and the skills of the attacker evolve

More Related Content

What's hot

Introduction of computer security
Introduction of computer securityIntroduction of computer security
Introduction of computer security
SoundaryaB2
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
Mohamed Loey
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and Challenge
Ikhtiar Khan Sohan
 
Network security
Network securityNetwork security
Network security
Simranpreet Singh
 
Top 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsTop 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEs
DarraghCommsec
 
Network management and security
Network management and securityNetwork management and security
Network management and security
Ankit Bhandari
 
APT - Hunting 0Day Malware
APT - Hunting 0Day MalwareAPT - Hunting 0Day Malware
APT - Hunting 0Day Malware
Mustafa Qasim
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
Sachithra Gayan
 
ip spoofing by Ipshita Nandy
 ip spoofing by Ipshita Nandy ip spoofing by Ipshita Nandy
ip spoofing by Ipshita Nandy
IpshitaNandy
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
Manesh T
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Pierluigi Paganini
 
Network Security
Network SecurityNetwork Security
Network Security
Techknow Book
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
Vikram Khanna
 
Network security
 Network security Network security
Network security
Vikas Jagtap
 
Beveilig je data met windows 10
Beveilig je data met windows 10 Beveilig je data met windows 10
Beveilig je data met windows 10
Avanade Nederland
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
webhostingguy
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
ShafeeqaFarsana
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
Stefano Maria De' Rossi
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Trend Micro
 

What's hot (20)

Introduction of computer security
Introduction of computer securityIntroduction of computer security
Introduction of computer security
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and Challenge
 
Network security
Network securityNetwork security
Network security
 
Top 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEsTop 10 Cyber Security Tips for SMEs
Top 10 Cyber Security Tips for SMEs
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
APT - Hunting 0Day Malware
APT - Hunting 0Day MalwareAPT - Hunting 0Day Malware
APT - Hunting 0Day Malware
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
ip spoofing by Ipshita Nandy
 ip spoofing by Ipshita Nandy ip spoofing by Ipshita Nandy
ip spoofing by Ipshita Nandy
 
Security in Computer System
Security in Computer SystemSecurity in Computer System
Security in Computer System
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Network Security
Network SecurityNetwork Security
Network Security
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Network security
 Network security Network security
Network security
 
Beveilig je data met windows 10
Beveilig je data met windows 10 Beveilig je data met windows 10
Beveilig je data met windows 10
 
Network Security Tools and applications
Network Security Tools and applicationsNetwork Security Tools and applications
Network Security Tools and applications
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...E Fraud And Predictive Forensic Profiling    Reducing Losses By Combining Sci...
E Fraud And Predictive Forensic Profiling Reducing Losses By Combining Sci...
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
 

Similar to "Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin

Advanced Metering Infrastructure Security Test.pptx
Advanced Metering Infrastructure Security Test.pptxAdvanced Metering Infrastructure Security Test.pptx
Advanced Metering Infrastructure Security Test.pptx
Francesco Faenzi
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
ST_World
 
Security Issues for Cloud Applications
Security Issues for Cloud ApplicationsSecurity Issues for Cloud Applications
Security Issues for Cloud Applications
Guillermo Remache
 
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Danny Miller
 
Securing your telco cloud
Securing your telco cloud Securing your telco cloud
Securing your telco cloud
OPNFV
 
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
Get Mainframe Visibility to Enhance SIEM Efforts in SplunkGet Mainframe Visibility to Enhance SIEM Efforts in Splunk
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
Precisely
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem
PositiveTechnologies
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
marukanda
 
Intrusion detection 2001
Intrusion detection 2001Intrusion detection 2001
Intrusion detection 2001
eaiti
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
AWS User Group Bengaluru
 
Cloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challengesCloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challenges
Vaibhav Khanna
 
Cyber Risks Implementation on an IP MPLS Network
Cyber Risks Implementation on an IP MPLS NetworkCyber Risks Implementation on an IP MPLS Network
Cyber Risks Implementation on an IP MPLS Network
Gabriel E Ozique
 
GDPR v pojetí F5
GDPR v pojetí F5GDPR v pojetí F5
GDPR v pojetí F5
MarketingArrowECS_CZ
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
PROIDEA
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
Lenin Aboagye
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
Symosis Security (Previously C-Level Security)
 
Power Grid Communications & Control Systems
Power Grid Communications & Control SystemsPower Grid Communications & Control Systems
Power Grid Communications & Control Systems
fajjarrehman
 
Information Security
Information SecurityInformation Security
Information Security
Mohit8780
 
Eseye
Eseye Eseye
Eseye
Terry Bonnar
 

Similar to "Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin (20)

Advanced Metering Infrastructure Security Test.pptx
Advanced Metering Infrastructure Security Test.pptxAdvanced Metering Infrastructure Security Test.pptx
Advanced Metering Infrastructure Security Test.pptx
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 
Security Issues for Cloud Applications
Security Issues for Cloud ApplicationsSecurity Issues for Cloud Applications
Security Issues for Cloud Applications
 
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...Nfp Seminar Series   Danny   November 18   Emerging Technology Challenges And...
Nfp Seminar Series Danny November 18 Emerging Technology Challenges And...
 
Securing your telco cloud
Securing your telco cloud Securing your telco cloud
Securing your telco cloud
 
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
Get Mainframe Visibility to Enhance SIEM Efforts in SplunkGet Mainframe Visibility to Enhance SIEM Efforts in Splunk
Get Mainframe Visibility to Enhance SIEM Efforts in Splunk
 
5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem5G mission diary: Houston, we have a problem
5G mission diary: Houston, we have a problem
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Intrusion detection 2001
Intrusion detection 2001Intrusion detection 2001
Intrusion detection 2001
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challengesCloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challenges
 
Cyber Risks Implementation on an IP MPLS Network
Cyber Risks Implementation on an IP MPLS NetworkCyber Risks Implementation on an IP MPLS Network
Cyber Risks Implementation on an IP MPLS Network
 
GDPR v pojetí F5
GDPR v pojetí F5GDPR v pojetí F5
GDPR v pojetí F5
 
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastrukturyPlnog 3: Zbigniew Skurczyński -  Wirtualizacja i optymalizacja infrastruktury
Plnog 3: Zbigniew Skurczyński - Wirtualizacja i optymalizacja infrastruktury
 
Mobile Application Security
Mobile Application SecurityMobile Application Security
Mobile Application Security
 
Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012Mobile application securitry risks ISACA Silicon Valley 2012
Mobile application securitry risks ISACA Silicon Valley 2012
 
Power Grid Communications & Control Systems
Power Grid Communications & Control SystemsPower Grid Communications & Control Systems
Power Grid Communications & Control Systems
 
Information Security
Information SecurityInformation Security
Information Security
 
Eseye
Eseye Eseye
Eseye
 

More from HackIT Ukraine

"CyberGuard — проект государственно-частного партнерства по созданию киберцен...
"CyberGuard — проект государственно-частного партнерства по созданию киберцен..."CyberGuard — проект государственно-частного партнерства по созданию киберцен...
"CyberGuard — проект государственно-частного партнерства по созданию киберцен...
HackIT Ukraine
 
"В поисках уязвимостей мобильных приложений", Алексей Голубев
"В поисках уязвимостей мобильных приложений", Алексей Голубев"В поисках уязвимостей мобильных приложений", Алексей Голубев
"В поисках уязвимостей мобильных приложений", Алексей Голубев
HackIT Ukraine
 
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
HackIT Ukraine
 
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
HackIT Ukraine
 
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
HackIT Ukraine
 
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
HackIT Ukraine
 
"Как ловят хакеров в Украине", Дмитрий Гадомский
"Как ловят хакеров в Украине", Дмитрий Гадомский"Как ловят хакеров в Украине", Дмитрий Гадомский
"Как ловят хакеров в Украине", Дмитрий Гадомский
HackIT Ukraine
 
"Security Requirements Engineering", Oleksii Baranovskyi
"Security Requirements Engineering", Oleksii Baranovskyi"Security Requirements Engineering", Oleksii Baranovskyi
"Security Requirements Engineering", Oleksii Baranovskyi
HackIT Ukraine
 
"Наступну атаку можна попередити", Олександр Чубарук
"Наступну атаку можна попередити", Олександр Чубарук"Наступну атаку можна попередити", Олександр Чубарук
"Наступну атаку можна попередити", Олександр Чубарук
HackIT Ukraine
 
"How to make money with Hacken?", Dmytro Budorin
"How to make money with Hacken?", Dmytro Budorin"How to make money with Hacken?", Dmytro Budorin
"How to make money with Hacken?", Dmytro Budorin
HackIT Ukraine
 
"Bypassing two factor authentication", Shahmeer Amir
"Bypassing two factor authentication", Shahmeer Amir"Bypassing two factor authentication", Shahmeer Amir
"Bypassing two factor authentication", Shahmeer Amir
HackIT Ukraine
 
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ..."Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
HackIT Ukraine
 
"Introduction to Bug Hunting", Yasser Ali
"Introduction to Bug Hunting", Yasser Ali"Introduction to Bug Hunting", Yasser Ali
"Introduction to Bug Hunting", Yasser Ali
HackIT Ukraine
 
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...
"Hack it. Found it. Sell it. How hackers can be successful in the business wo..."Hack it. Found it. Sell it. How hackers can be successful in the business wo...
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...
HackIT Ukraine
 
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
HackIT Ukraine
 
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...
HackIT Ukraine
 
Владимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challengesВладимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challenges
HackIT Ukraine
 
Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?
HackIT Ukraine
 
Лариса Матвеева - Хакеры и уголовная ответственность: как избежать негативных...
Лариса Матвеева - Хакеры и уголовная ответственность: как избежать негативных...Лариса Матвеева - Хакеры и уголовная ответственность: как избежать негативных...
Лариса Матвеева - Хакеры и уголовная ответственность: как избежать негативных...
HackIT Ukraine
 
Andrew Dodson - Smart grids are stupid ideas
Andrew Dodson - Smart grids are stupid ideasAndrew Dodson - Smart grids are stupid ideas
Andrew Dodson - Smart grids are stupid ideas
HackIT Ukraine
 

More from HackIT Ukraine (20)

"CyberGuard — проект государственно-частного партнерства по созданию киберцен...
"CyberGuard — проект государственно-частного партнерства по созданию киберцен..."CyberGuard — проект государственно-частного партнерства по созданию киберцен...
"CyberGuard — проект государственно-частного партнерства по созданию киберцен...
 
"В поисках уязвимостей мобильных приложений", Алексей Голубев
"В поисках уязвимостей мобильных приложений", Алексей Голубев"В поисках уязвимостей мобильных приложений", Алексей Голубев
"В поисках уязвимостей мобильных приложений", Алексей Голубев
 
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
 
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
 
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
 
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
 
"Как ловят хакеров в Украине", Дмитрий Гадомский
"Как ловят хакеров в Украине", Дмитрий Гадомский"Как ловят хакеров в Украине", Дмитрий Гадомский
"Как ловят хакеров в Украине", Дмитрий Гадомский
 
"Security Requirements Engineering", Oleksii Baranovskyi
"Security Requirements Engineering", Oleksii Baranovskyi"Security Requirements Engineering", Oleksii Baranovskyi
"Security Requirements Engineering", Oleksii Baranovskyi
 
"Наступну атаку можна попередити", Олександр Чубарук
"Наступну атаку можна попередити", Олександр Чубарук"Наступну атаку можна попередити", Олександр Чубарук
"Наступну атаку можна попередити", Олександр Чубарук
 
"How to make money with Hacken?", Dmytro Budorin
"How to make money with Hacken?", Dmytro Budorin"How to make money with Hacken?", Dmytro Budorin
"How to make money with Hacken?", Dmytro Budorin
 
"Bypassing two factor authentication", Shahmeer Amir
"Bypassing two factor authentication", Shahmeer Amir"Bypassing two factor authentication", Shahmeer Amir
"Bypassing two factor authentication", Shahmeer Amir
 
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ..."Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
 
"Introduction to Bug Hunting", Yasser Ali
"Introduction to Bug Hunting", Yasser Ali"Introduction to Bug Hunting", Yasser Ali
"Introduction to Bug Hunting", Yasser Ali
 
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...
"Hack it. Found it. Sell it. How hackers can be successful in the business wo..."Hack it. Found it. Sell it. How hackers can be successful in the business wo...
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...
 
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
 
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...
 
Владимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challengesВладимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challenges
 
Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?Алексей Старов - Как проводить киберраследования?
Алексей Старов - Как проводить киберраследования?
 
Лариса Матвеева - Хакеры и уголовная ответственность: как избежать негативных...
Лариса Матвеева - Хакеры и уголовная ответственность: как избежать негативных...Лариса Матвеева - Хакеры и уголовная ответственность: как избежать негативных...
Лариса Матвеева - Хакеры и уголовная ответственность: как избежать негативных...
 
Andrew Dodson - Smart grids are stupid ideas
Andrew Dodson - Smart grids are stupid ideasAndrew Dodson - Smart grids are stupid ideas
Andrew Dodson - Smart grids are stupid ideas
 

Recently uploaded

About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...
Erkinjon Erkinov
 
一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理
一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理
一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理
taqyea
 
一比一原版(uh毕业证)休斯敦大学毕业证如何办理
一比一原版(uh毕业证)休斯敦大学毕业证如何办理一比一原版(uh毕业证)休斯敦大学毕业证如何办理
一比一原版(uh毕业证)休斯敦大学毕业证如何办理
mvahxyy
 
一比一原版(liverpool毕业证)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证)利物浦大学毕业证如何办理一比一原版(liverpool毕业证)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证)利物浦大学毕业证如何办理
mvahxyy
 
IP address - Past, Present and Future presented by Paul Wilson
IP address - Past, Present and Future presented by Paul WilsonIP address - Past, Present and Future presented by Paul Wilson
IP address - Past, Present and Future presented by Paul Wilson
APNIC
 
Pune @Call @Girls 🛴 XXXXXXXXXX 🛴 available 24*7 cash payment book now pay later
Pune @Call @Girls 🛴 XXXXXXXXXX 🛴 available 24*7 cash payment book now pay laterPune @Call @Girls 🛴 XXXXXXXXXX 🛴 available 24*7 cash payment book now pay later
Pune @Call @Girls 🛴 XXXXXXXXXX 🛴 available 24*7 cash payment book now pay later
samyanvichadda
 
Tama Tonga MFT T shirts Tama Tonga MFT T shirts
Tama Tonga MFT T shirts Tama Tonga MFT T shirtsTama Tonga MFT T shirts Tama Tonga MFT T shirts
Tama Tonga MFT T shirts Tama Tonga MFT T shirts
exgf28
 
一比一原版(city毕业证书)英国剑桥大学毕业证如何办理
一比一原版(city毕业证书)英国剑桥大学毕业证如何办理一比一原版(city毕业证书)英国剑桥大学毕业证如何办理
一比一原版(city毕业证书)英国剑桥大学毕业证如何办理
taqyea
 
一比一原版美国休斯敦大学毕业证(uh毕业证书)如何办理
一比一原版美国休斯敦大学毕业证(uh毕业证书)如何办理一比一原版美国休斯敦大学毕业证(uh毕业证书)如何办理
一比一原版美国休斯敦大学毕业证(uh毕业证书)如何办理
taqyea
 
一比一原版(london毕业证书)英国伦敦大学毕业证如何办理
一比一原版(london毕业证书)英国伦敦大学毕业证如何办理一比一原版(london毕业证书)英国伦敦大学毕业证如何办理
一比一原版(london毕业证书)英国伦敦大学毕业证如何办理
taqyea
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
taqyea
 
PSD to Wordpress Service Providers in 2024
PSD to Wordpress Service Providers in 2024PSD to Wordpress Service Providers in 2024
PSD to Wordpress Service Providers in 2024
Bestdesign2hub
 
Cyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdfCyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdf
RohitRoshanBengROHIT
 
@Call @Girls Vile Parle phone 9920874524 You Are Serach A Beautyfull Dolle co...
@Call @Girls Vile Parle phone 9920874524 You Are Serach A Beautyfull Dolle co...@Call @Girls Vile Parle phone 9920874524 You Are Serach A Beautyfull Dolle co...
@Call @Girls Vile Parle phone 9920874524 You Are Serach A Beautyfull Dolle co...
RACHANA GUPTA
 
Nerul @Call @Girls Whatsapp 9920725232 With High Profile Offer
Nerul @Call @Girls Whatsapp 9920725232 With High Profile OfferNerul @Call @Girls Whatsapp 9920725232 With High Profile Offer
Nerul @Call @Girls Whatsapp 9920725232 With High Profile Offer
vinodkumar03065
 
Founders Of Digital World Social Media..
Founders Of Digital World Social Media..Founders Of Digital World Social Media..
Founders Of Digital World Social Media..
jom pom
 
一比一原版(爱大毕业证书)英国爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)英国爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)英国爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)英国爱丁堡大学毕业证如何办理
taqyea
 
How to Choose the Right UIUX Design Service for Optimal Customer Experience
How to Choose the Right UIUX Design Service for Optimal Customer ExperienceHow to Choose the Right UIUX Design Service for Optimal Customer Experience
How to Choose the Right UIUX Design Service for Optimal Customer Experience
Serva AppLabs
 
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
ffg01100
 
Carrington degree offer diploma Transcript
Carrington degree offer diploma TranscriptCarrington degree offer diploma Transcript
Carrington degree offer diploma Transcript
ubufe
 

Recently uploaded (20)

About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...About Alibaba company and brief general information regarding how to trade on...
About Alibaba company and brief general information regarding how to trade on...
 
一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理
一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理
一比一原版(brunel毕业证书)英国布鲁内尔大学毕业证如何办理
 
一比一原版(uh毕业证)休斯敦大学毕业证如何办理
一比一原版(uh毕业证)休斯敦大学毕业证如何办理一比一原版(uh毕业证)休斯敦大学毕业证如何办理
一比一原版(uh毕业证)休斯敦大学毕业证如何办理
 
一比一原版(liverpool毕业证)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证)利物浦大学毕业证如何办理一比一原版(liverpool毕业证)利物浦大学毕业证如何办理
一比一原版(liverpool毕业证)利物浦大学毕业证如何办理
 
IP address - Past, Present and Future presented by Paul Wilson
IP address - Past, Present and Future presented by Paul WilsonIP address - Past, Present and Future presented by Paul Wilson
IP address - Past, Present and Future presented by Paul Wilson
 
Pune @Call @Girls 🛴 XXXXXXXXXX 🛴 available 24*7 cash payment book now pay later
Pune @Call @Girls 🛴 XXXXXXXXXX 🛴 available 24*7 cash payment book now pay laterPune @Call @Girls 🛴 XXXXXXXXXX 🛴 available 24*7 cash payment book now pay later
Pune @Call @Girls 🛴 XXXXXXXXXX 🛴 available 24*7 cash payment book now pay later
 
Tama Tonga MFT T shirts Tama Tonga MFT T shirts
Tama Tonga MFT T shirts Tama Tonga MFT T shirtsTama Tonga MFT T shirts Tama Tonga MFT T shirts
Tama Tonga MFT T shirts Tama Tonga MFT T shirts
 
一比一原版(city毕业证书)英国剑桥大学毕业证如何办理
一比一原版(city毕业证书)英国剑桥大学毕业证如何办理一比一原版(city毕业证书)英国剑桥大学毕业证如何办理
一比一原版(city毕业证书)英国剑桥大学毕业证如何办理
 
一比一原版美国休斯敦大学毕业证(uh毕业证书)如何办理
一比一原版美国休斯敦大学毕业证(uh毕业证书)如何办理一比一原版美国休斯敦大学毕业证(uh毕业证书)如何办理
一比一原版美国休斯敦大学毕业证(uh毕业证书)如何办理
 
一比一原版(london毕业证书)英国伦敦大学毕业证如何办理
一比一原版(london毕业证书)英国伦敦大学毕业证如何办理一比一原版(london毕业证书)英国伦敦大学毕业证如何办理
一比一原版(london毕业证书)英国伦敦大学毕业证如何办理
 
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)爱丁堡大学毕业证如何办理
 
PSD to Wordpress Service Providers in 2024
PSD to Wordpress Service Providers in 2024PSD to Wordpress Service Providers in 2024
PSD to Wordpress Service Providers in 2024
 
Cyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdfCyber Security Course & Guide. X.GI. pdf
Cyber Security Course & Guide. X.GI. pdf
 
@Call @Girls Vile Parle phone 9920874524 You Are Serach A Beautyfull Dolle co...
@Call @Girls Vile Parle phone 9920874524 You Are Serach A Beautyfull Dolle co...@Call @Girls Vile Parle phone 9920874524 You Are Serach A Beautyfull Dolle co...
@Call @Girls Vile Parle phone 9920874524 You Are Serach A Beautyfull Dolle co...
 
Nerul @Call @Girls Whatsapp 9920725232 With High Profile Offer
Nerul @Call @Girls Whatsapp 9920725232 With High Profile OfferNerul @Call @Girls Whatsapp 9920725232 With High Profile Offer
Nerul @Call @Girls Whatsapp 9920725232 With High Profile Offer
 
Founders Of Digital World Social Media..
Founders Of Digital World Social Media..Founders Of Digital World Social Media..
Founders Of Digital World Social Media..
 
一比一原版(爱大毕业证书)英国爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)英国爱丁堡大学毕业证如何办理一比一原版(爱大毕业证书)英国爱丁堡大学毕业证如何办理
一比一原版(爱大毕业证书)英国爱丁堡大学毕业证如何办理
 
How to Choose the Right UIUX Design Service for Optimal Customer Experience
How to Choose the Right UIUX Design Service for Optimal Customer ExperienceHow to Choose the Right UIUX Design Service for Optimal Customer Experience
How to Choose the Right UIUX Design Service for Optimal Customer Experience
 
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
202254.com免费观看《长相思第二季》免费观看高清,长相思第二季线上看,《长相思第二季》最新电视剧在线观看,杨紫最新电视剧
 
Carrington degree offer diploma Transcript
Carrington degree offer diploma TranscriptCarrington degree offer diploma Transcript
Carrington degree offer diploma Transcript
 

"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin

  • 1. Preventing loss of personal data on a Mobile Network 23.09.2017 / Oleksii Lukin / Head Of Information Security SubDepartment Public
  • 2. • Lukin Oleksii – Head od Information Security SubDepartment • Scope – Presentation focused on technical attacks on a Mobile network and its supporting infrastructure – Does not looking specifically are employee internal risks or social engineering attacks both of which constitute significant risks for any organisation Introduction 2
  • 3. 1. Definition of personal data in a mobile network 2. Mobile Network attacks & controls 3. BSS & Corporate Network attacks & controls 4. Key Message Agenda
  • 4. Definition of personal data in a mobile network 4 Mobile Network & Corporate systems Generated Business Process Generated Processed and stored on Network & IT Systems • Customer • Location data (cell site, country) • Usage records created for billing • Call, SMS, MMS details (not content) • Data usage • Corporate • Email • Web browsing • Customer • Account type (e.g. pre or post- paid/residential or business) • Name of customer • Billing Address • Payment details • Employee • Name • Contact details • Salary Dynamic/Event Static
  • 5. Mobile Network Attacks - External 5 Mobile Network GRX Network (Used for roaming data traffic) Internet (Used for data traffic) SS7/Diameter (Used for roaming & interconnect signalling) Radio Access Network • All area of a Mobile Network are under constant academic study for new vulnerabilities that impact customer privacy
  • 6. Mobile Network Attacks - External Signalling • SS7 (2G-3G) – Know attacks on SS7 signalling network – Abuse MAP signalling protocol – Take advantage of external links to roaming partners – Used for location tracking and call/SMS interception – DoS on individual customer or network • Diameter (4G) – New protocol replacing SS7 in LTE networks – Attacks similar to SS7 – Difficult to track origination as uses hop-by hop • GRX traffic – GTP protocol hacking – DNS attacks – Remote Call control – DoS • SS7 – Signalling firewall blocking all unauthorised MAP signalling traffic – GSMA standardised controls – Monitoring for abuse (SIEM) • Diameter – Signalling firewall – GSMA standardised controls – Implementation of Diameter Routing Agent/Diameter Edge Agent – IPsec on external connection with IPX provider – Monitoring for abuse (SIEM) • GRX (called IPX in 4G) – GTP protocol aware firewall border firewall – DNS hardening – White lists of valid roaming partners – Uses of GRX/IPX hub provider – Monitoring for abuse (SIEM) 6 Risks Controls
  • 7. Mobile Network Attacks – Radio Access Network • 2G/2.5G – Risks well know – Man in the middle (IMSI Catcher) for accurate location and call/SMS interception – Weaknesses in GPRS protocol – Weakness in over the air encryption keys • 3G – Limited location attacks • 4G – Standard network IP backhaul network open to eavesdropping of customer traffic • 2G/2.5G – Implementation of latest GSMA encryption algorithms – Configuration of authentication and over the air encryption parameters – Customer applications that can detect MITM attacks • 3G – Standard has improved encryption and network mutual authentication – Configuration of authentication and over the air encryption • 4G – Use of IPSec to protect backhaul network – Standard has improved encryption and over the air authentication 7 Risks Controls
  • 8. Mobile Network Attacks – Internet • Same standardised Internet access for all radio technologies e.g. 2.5G/3G/4G • DoS – Customer – Network elements • DNS – DoS – Poisoning • Products & Services (web) – DoS, hacking & scripting on – Customer Portal – Self service – Products (e.g. Child location tracking) • Border firewall • DoS Protection • NAT’ng • Hardened DNS • Web services – WAF – Code review & Testing – Internal vulnerability Scanning • External vulnerability scanning • Monitoring for abuse (SIEM) 8 Risks Controls
  • 9. Mobile Network Attacks – Internal • Network & Service Delivery Elements – Unauthorised access to customer information – Ability to change customer service profile • Note: Each network element or service delivery platform has differing risks and may or may not contain meaningful customer information – e.g. GSM uses a temporary identity (T-IMSI) on some network elements to hide the customer true IMSI • Internal firewall between domains • Strong access control policy • Security Patch management • Security testing • Internal vulnerability scanning • Monitoring for abuse (SIEM) 9 Risks Controls
  • 10. Remote Vendor Support • Mobile network generated event data is stored and processed in the BSS environment • There is segmentation between corporate users and BSS platforms Business Support System (BSS) & Corporate Network 10 BSS & Corporate Internet (email, Corporate Internet) Mobile Network
  • 11. BSS & Corporate Network Attacks – External • Corporate Email – Phishing – Malware & Virus – SPAM – DoS • Corporate Internet – DoS – Malware & Virus – Hacking – Fake sites – Internal DNS • Unprotected vendor access – Unauthorised access to Network and IT systems • Border firewall – DoS Protection • Hardened DNS • External vulnerability scanning • Anti-virus and Malware protection • Security Patching • Data Loss Protection – Protects against internal fraud/abuse of customer information • VPN, VDI, strong authentication for vendor access • Monitoring for abuse (SIEM) 11 Risks Controls
  • 12. BSS & Corporate Network Attacks - Internal • Billing & Charging Platforms – Loss or corruption of charging event data – Unauthorised access to customer information • Customer Care – Unauthorised access to customer information – Unauthorised changes (fraud) • Data Warehouse & Reporting Systems – Unauthorised access to customer information • HR Systems – Access to personal employee information • Network Support Systems – Ability to monitor customer activity – Unauthorised changes to customer’s service • Border firewall – DoS Protection • Hardened DNS • External vulnerability scanning • Anti-virus and Malware protection • Security Patching • Data Loss Protection – Protects against internal fraud/abuse of customer & corporate information • Strong access control policy • VPN, VDI & strong authentication for vendor access • Monitoring for abuse (SIEM) 12 Risks Controls
  • 13. • Personal data is created and stored both in the Mobile , BSS and Corporate networks • Some areas of risk are harder to manage as they are reliant on – Technology standardisation – People • Security should always be applied in layers with good basic principles • Initial security assessment with continual testing and review • 24x7 monitoring using a SOC (SIEM) • Effective incident response process Key Message 13 Managing the risks to personal data is a continuous process as technology and the skills of the attacker evolve